Welcome to our community.

In this community, you can submit ideas, vote on existing ideas, or add comments.

To submit an idea, please click the Submit New Idea button at the top of the navigation sidebar. You will then be asked to add a title and choose a campaign for the new idea. You will also have the option to add tags to the idea. To vote on an idea, simply click the up or down arrows to the right of the idea title/description. And to add a comment, click in the box below the idea.

If you would like to see all ideas created with a specific tag, you can click on the word or phrase via the tagcloud in the navigation sidebar area under "What we're discussing". You can also view ideas sorted by Campaigns from the right navigation area. To return to this page, click the All Ideas link.

Filter Ideas by Status:

Current Status:

Status List:

Note: this case is not itself a scenario, but rather a common theme extracted from the scenarios above.
The previous two examples consideration raise the issue of identity management, which is intimately connected with the FAM requirements for some of the use cases, in particular those that involve a long duration in some way. The current approach in the UK federation addresses identity only for relatively short durations,
...more »

Feedback Score

Some repository access will involve changes to the content of the repository, for example:
 deposit of an object;
 editorial activities such as modification of an object’s metadata
 annotation of an object;
 administrative and maintenance activities.
The question arises: in such a case, is it important for repository managers to be able to determine who carried out the action at a later date? This would place requirements
...more »

Feedback Score

A similar use case to 2A is where a resource’s owner has attached additional conditions around accessing/using a resource, and individual users must agree to a licence before they are granted access. For example, users may be obliged to agree to use a resource only for educational or non-profit purposes, or to observe copyright
This can be implemented using eduPersonTargetedID; that is, this attribute can be used to
...more »

Feedback Score

Related but more problematic scenarios occur where access crosses national jurisdictions. Again, we should identify separate cases that may require different treatment: (a) access within an HE institution that has international campuses (b) access between different institutions, whether this is a matter of long-term cooperation between institutions, or shorter-term international research projects that require cross-border
...more »

Feedback Score

By “non-published” material in the repository, we mean material that is only accessible to an individual or to an identified group of people. Examples are: (i) “work in progress”, where the author may only wish a small group of users to have access; (ii) research data that is stored in a repository while it is still being worked with, and where access is restricted to the members of the research group; (iii) research
...more »

Feedback Score

A user’s interaction with a repository may be personalised, for example by saved searches or tailored notifications of new material. Personalisation is by no means specific to repository environments, and it is not clear that repositories raise any particular personalisation issues that do not arise in other environments. However, it is still worth mentioning in this context. Within JISC, the DPIE2 (Developing Personalisation
...more »

Feedback Score

It may be necessary to make a resource available to different degrees in the case of different users. Examples of this are: (i) medical data containing personal information may need to be anonymised for one set of users, but not for (say) the patient’s own doctor(s); (ii) some parts of a thesis may be made available immediately, others only after a certain period has elapsed; (iii) a thesis may contain copyrighted material
...more »

Feedback Score

Not all access to repositories will involve a researcher sitting at a web browser. Other possibilities include the following, neither of which is currently handled easily by Shibboleth:
(a) Access from a desktop client, which may allow updates in some form (e.g. a metadata editor, a client performing multiple inserts). Examples of relevant projects and approaches include: HERMES (see below); SWITCH (the Swiss access
...more »

Feedback Score

This scenario covers two cases: (a) users at institutions that are not in the federation (or which do not possess an IdP); (b) users that are not affiliated with an institution at all. Different solutions may be appropriate for these cases
An example of (a) is provided by academic research groups that cross over into non-academic environments. A case worth highlighting is in medical research, where a group needing access
...more »

Feedback Score

Many of the digital objects in a repository will continue to exist over the long term, possibly with modifications relating to preservation requirements. It is essential from a preservation point of view that provenance/audit information is preserved about these objects (who did what, when and how); otherwise the authenticity of the objects and the trust placed in the repository cannot be guaranteed. These scenarios also
...more »

Feedback Score

This website aims to provide initial points and facilities to stimulate discussion, not to carry out a complete survey of all related issues. It contains the following sections:
• A broad statement of the issues being addressed.
• An overview of the current approach to Federated Access Management (FAM) in the UK HE environment.
• A set of brief scenarios describing different aspects of FAM in digital repository environments.
...more »

Feedback Score

One potential way of resolving the conflict between privacy requirements and the need to identify users is to investigate scenarios in which users are asked for their consent to the release of personal information. The DPIE2 (Developing Personalisation for the Information Environment 2) project has considered this (see below), and there are some related current and upcoming JISC ITTs: the Identity Management Toolkit
...more »

Feedback Score

Organic access management, where the resource owner is directly involved in determining who has access to resources under their control. The central idea here is that people are willing to share in self-selected communities. This scenario is likely to be most applicable to more informal resources (e.g. presentations, videos) in “social” repositories (e.g. Yahoo groups, MyFlickr). This is not to say that they are any less
...more »

Feedback Score

Much work on digital repositories has focused on issues surrounding Open Access to research outputs (generally pre- or post-prints). If access to an object is truly open, then it may seem that access management is not an issue. However, we may distinguish 2 cases:
 The SP has no interest in who is accessing a resource.
 Access to resources is open, but the SP is still interested in capturing information about usage.
...more »

Feedback Score

A resource may be published and widely available yet still subject to access restrictions within a digital repository (SHERPA/RoMEO maintains an extensive database of the copyright and self-archiving policies of publishers). For example, a publisher may place restrictions on accessing a post-print in an institutional repository to subscribers to the journal in which it was included . This is analogous to a library allowing
...more »